數據阻塞 的英文怎麼說

中文拼音 [shǔ]
數據阻塞 英文
data jamming
  • : 數副詞(屢次) frequently; repeatedly
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • : 動詞(阻擋; 阻礙) block; hinder; impede; obstruct
  • 數據 : data; record; information
  • 阻塞 : choke; block; clog; stop; obstruct; jam; barrage; blockage; blocking; [醫學] obstruction; choking...
  1. Fsmail adopts and implements the asynchronous event driven mechanism, with all those network i / o operations in the server working under the non - blocking style ; accomplishes object - oriented heap with the dynamic array, adapted to any type of data ; adopts the multi - queue scheduling mechanism based on a fsm, easily to fulfill the extentions of delivery funtions ; fulfills the non - blocking domain name resolvement mechanism and the caching of the resolved results ; implements the non - blocking user database management and the caching of the user data recently accessed ; uses the unified memory pool management, avoiding the memory leakage and improving the performance of the fsmail server ; lastly, implements the log management server based on the c / s mode, eliminating the inconsistency of the logging metadata and being adapted to any kind of application logging

    Fsmail採用並實現了異步事件驅動機制,所有網路i o的實現使用了非方式;以動態組實現了基於面向對象的堆隊列,屏蔽了堆的非一致性;使用了基於有限狀態機的多隊列郵件調度機制,為后續版本的擴展性提供了良好的介面機制;服務器內部實現了非的域名解析機制,並實現域名地址緩存;實現了非的用戶庫管理模塊,並實現用戶緩存;使用了統一的內存池管理機制,既防止了內存泄漏,又提高了服務器的性能;最後,還實現了基於c s模式的日誌管理服務器,屏蔽了日誌元的非一致性。
  2. With the setting of the peculiar conditions, we contribute the above system model for the first time to a kendall model, i. e. / l, : the size of buffer 1 / fcfs ( for same kinds of cells ) / l2 : the size of buffer 2 / non - prevail pr ( for different kinds of cells ) we resolved the model by " state transfer " method

    在設定工作環境及條件的基礎上,本論文首次為該系統模型建立了肯達爾排隊模型。即:並運用狀態轉移方法進行了解析。最後的模擬實驗表明優先級調度輸入?線群多通道輸出atm交換系統模型較好地改善了hol,提高了輸入排隊atm交換網路的性能。
  3. Call blocking when no data was available, the call seemed instead to be polling continuously

    調用不是在沒有可用時,而是似乎在不斷地輪詢。
  4. Verify that your rules are efficient, that you have the proper indexes defined on event and subscription data, that vacuuming is running to remove old data, and that the rules are not being blocked by other processes running on the server

    驗證下列各項:您的規則有效、您對事件和訂閱定義了正確的索引、正在運行清空操作以刪除舊,以及規則未被服務器上運行的其他進程
  5. The second one is how can we capture the data just before they are sent out or received in. the third one is how can we inform our monitor or debugger process this event, transfer the data to the monitor or debugger, and get the results back. as far as microsoft windows operation system is concerned, which mostly has been installed on personal computers and partly server cmputers, softwares access data in internet through windows socket application program interface

    就被廣泛安裝在個人計算機和一部分服務計算機的微軟視窗操作系統而言,軟體通常通過操作系統提供的套接字網路介面訪問網路,在視窗操作系統上有兩套網路介面,一是由伯克勒大學設計,被稱之為bsd套接字的介面,由同步和非異步以及輪循機制控制輸入和輸出工作;另一套是微軟公司開發的窗口套接字,由網路消息事件驅動。
  6. In the deregulated power market , the power grid operator is facing many uncertainty and risks risk concept , risk analysis approach and risk management are introduced in chapter ii , the maj or risks of grid operators is analyzed and evaluated in details based on the real situation and data of yueyang city, hunan province , the economic risk resulting from the uncertainty of load prediction of whole system , generation capacity and parallel quantity of the large enterprises self - owned power plant are analyzed meanwhile , the increase of large enterprises self - owned power plant may cause economic and security risks considering different risk , the qualitmive and quantitative approaches are respectively adopted the direct and indirect congestion risks are evaluated based on probabilistic theory and decision theory the retail pricing and trade modes are major areas embracing risks as well chapter iii divides the risks in internal and external ones based on the characteristics of risk and put forward the layered risk management approach

    詳細分析和論述了電網經營企業面臨的各種風險。基於湖南省岳陽地區電力市場的實際情況和多年歷史,採用定性分析和定量計算的手段具體分析了負荷、自備電廠發電量和上網電量預測不確定性以及自備電廠的大量增加給電網企業帶來的經濟性風險和安全性風險。無論是長期還是短期,不僅會對電網造成直接風險,還可能造成間接風險。
  7. Between node and node, and between node and centralized index server, messages are used to carry information which accomplishes control functionalities of resource searching and locating

    該系統使用sctp承載各種控制消息和消息,並採用了基於消息無序遞交的隊頭抑制方案。
  8. Data is read from the channel in a nonblocking fashion and written to the

    是以非方式從通道中讀取的,並被寫到
  9. The linux device driver of pioneer - net uses circular buffer to receive data from pioneer - net card, and offers blocked and non - blocked data transmission modes

    先鋒網linux設備驅動程序採用循環接收緩沖區,並提供了式和非式兩種傳輸方式。
  10. It features a data prefetch engine, non - blocking interleaved data cache, dual floating point execution units, and many other goodies

    它特有一個預取引擎,無的交叉緩存,雙浮點執行單元,以及其他一些很好的設計。
  11. This paper proposes a multiple description mesh - based motion coding method, which generates two descriptionsfor mesh - based motion by subsampling the nodes of a right - angledtriangular mesh and dividing them into two groups. motion vectorsassociated with the mesh nodes in each group are transmitted overdistinct channels

    丟包由於網路路由延遲以及從高容量網路向低容量網路交換等和通道失效由於衰落效應和突發錯誤等使得在internet和無線通道上壓縮視頻的可靠傳輸成為新的研究課題。
  12. In the article some critical technology such as multi - thread oci socket and select function was analysed. to meet the requirement of real _ time power network supervisory system, a novel method is proposed to design and realize a data server

    結合在河南的工程實際項目,分析了為實現實時電網監測系統的一些關鍵技術(諸如多線程同步、 oci和模式等) ,最後設計和編寫了中調實時服務器程序。
  13. For example, if a socket receives data in its tcp ip buffer, then that socket is ready to be read from without blocking, and the

    例如,如果某個套接字在其tcp / ip緩沖區中接收到,那麼該套接字就為無的讀取做好準備了,
  14. Filter rules : allows the selective filtering or blocking of packets as they pass through any of the interfaces

    過濾規則:當包穿過網路介面的時候,允許有選擇的過濾或包。
  15. This paper, for the first time, we evaluates how traffic blocking rate is influence by the number of randomly placed key nodes

    我們所知,本文是第一次在動態多播業務背景下,評估關鍵節點量對于多播業務率的影響。
  16. At last we establish a platform using c / c + + language to simulate the blocking probability of networks. we draw a conclusion for our study at the end of the paper

    再接著介紹了wdm光網路率計算的模擬軟體平臺和主要結構代碼,並利用這個模擬平臺考察了各種模型的性能優劣。
  17. This dissertation will discuss the cell capacity under the admixture of various services in detail. for this purpose, we will establish a multi - services model for voice, background and streaming classes users

    為此,我們將引入話音、后臺、流業務共存的業務模型,通過模擬計算在不同業務量時的小區率,由此可以看出業務對整個小區容量的影響。
  18. The data transfer thread will be blocked until the transfer is complete, so it will not be able to process the window messages as soon as they arrive

    傳輸線程在完成傳輸前將被,因此在窗口消息到達時它將不能及時處理這些消息。
  19. With fca, the channel - reuse pattern can be optimized and the management of channel assignment to a mobile terminal is simplified. however, such a scheme cannot accommodate fluctuating traffic in a cell : when the traffic increases, the packet delay may increase to a undesirable level, or even been blocked

    較之傳統的語音業務來說,業務的分佈非常不均勻並且更具突發性,這使得即使是在第三代系統中,盡管系統容量有了較大的提升,但在通信的高峰時期,的情況仍然有可能在某些小區內發生。
  20. The classes data containers form the foundation of other nio operations like nonblocking reads over socket channels

    這些類的容器形成了其它nio操作(如套接字通道上的非讀取)的基礎。
分享友人